General
-
Target
5a57068f66938c8c0346643f8cedd304cd572b3c3f55e15887081b94edaa8987N.exe
-
Size
1.7MB
-
Sample
250121-f83x5symdn
-
MD5
4c5cdbe993419be6ff5d2608e01f7620
-
SHA1
0f9cddc4a321cd1641d5c207f7223f61de0c54dd
-
SHA256
5a57068f66938c8c0346643f8cedd304cd572b3c3f55e15887081b94edaa8987
-
SHA512
cae371309fda6b5fee01284ca445be72c47ab0816a2451835e8da5c9ba8bd741eab2160602d62b8064b80220a713d1d89a5371bcb2f6aaafba7f7c10150696d9
-
SSDEEP
24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:tgwuuEpdDLNwVMeXDL0fdSzAG
Behavioral task
behavioral1
Sample
5a57068f66938c8c0346643f8cedd304cd572b3c3f55e15887081b94edaa8987N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5a57068f66938c8c0346643f8cedd304cd572b3c3f55e15887081b94edaa8987N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
5a57068f66938c8c0346643f8cedd304cd572b3c3f55e15887081b94edaa8987N.exe
-
Size
1.7MB
-
MD5
4c5cdbe993419be6ff5d2608e01f7620
-
SHA1
0f9cddc4a321cd1641d5c207f7223f61de0c54dd
-
SHA256
5a57068f66938c8c0346643f8cedd304cd572b3c3f55e15887081b94edaa8987
-
SHA512
cae371309fda6b5fee01284ca445be72c47ab0816a2451835e8da5c9ba8bd741eab2160602d62b8064b80220a713d1d89a5371bcb2f6aaafba7f7c10150696d9
-
SSDEEP
24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:tgwuuEpdDLNwVMeXDL0fdSzAG
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-